Tokyo Session
Search (possible multiple choice)
Keyword
3.14(Fri)
-
13:30 | 14:10
-
-
A4-06
Revolutionizing Network Security with EntraID Suite and SecurityCopilot
-
Speaker
TIS Inc.
Section Chief
Security Solutions DepartmentMasashi Oguri
- Cloud security
- Authentication / Identity Management
- Zero trust security model
Presented byTIS Inc. / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-06
Coming soon
-
Speaker
MARUBENI IT SOLUTIONS INC.
-
Speaker
International Christian University
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
Closed
C4-06
Coming soon
-
Speaker
National center of Incident readiness and Strategy for Cybersecurity
Counsellor
Incident Handling and External Collaboration UnitMatsumoto Takashi
- Critical Infrastructure Security
-
Speaker
-
WS4-02
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
- PSIRT / CSIRT
- Human resource development
- Phishing Attack
- Workshop
-
-
14:25 | 15:05
-
-
A4-07
Three Key Actions You Should Take Now to Avoid Ransomware Attacks and Minimize Damage
-
Speaker
Japan Business Systems, Inc.
Cloud Managed Services Div.
Shohei Hanashita
- Ransomware measures
- SOC / Incident Response
- Software chain Attack
Presented byJapan Business Systems, Inc. / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-07
De-VPN and VDI Strategies to Protect Your Organization from Supply Chain Attacks
-
Speaker
Soliton Systems K.K.
Manager
Product Promotion Department, IT Security DivisionKazuki Mitsui
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
C4-07
Next Generation Micro-segmentation with AI Technology
〜Private Cloud - More Secure-
Speaker
Broadcom
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Critical Infrastructure Security
Presented byVMware K.K. (Broadcom)
-
Speaker
-
-
15:20 | 16:00
-
-
A4-08
Get the most out of Microsoft Sentinel with generative AI and automation!
95% reduction in security alert response operations!-
Speaker
NTT Communications Corporation
General Manager
Managed & Security Services , Security ServiciesYosuke Tobata
- Endpoint Security
- XDR
- SOC / Incident Response
Presented byNTT Communications Corporation / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-08
Coming soon
-
Speaker
3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
C4-08
Limitations and Dangers of Password Management/Now is the Era of Fully Passwordless
-
Speaker
KDDI Digital Security Inc.
Deputy General Manager
CReation Of the Security&Safety DivisionKenji Okoshi
- Measures against information leakage
- Authentication / Identity Management
- Application Security
Presented byKDDI Digital Security Inc.
-
Speaker
-
-
16:15 | 16:55
-
-
A4-09
Step ahead of attackers: Proactive Security made possible by the latest Threat Intelligence
-
Speaker
Recorded Future Japan KK
Sr Presales Engineer
Tomoyuki Matsuda
- Targeted Threat / Cyber Attack
- PSIRT / CSIRT
- SOC / Incident Response
Presented byRecorded Future Japan KK
-
Speaker
-
B4-09
Balancing Security and Sustainability: The Latest Global Trends in Data Erasure
-
Speaker
Blancco Technology Group / Blancco Japan Inc.
Regional Director, Japan
Motoi Mimatsu
- Endpoint Security
- Measures against information leakage
- Zero trust security model
Presented byBlancco Japan Inc.
-
Speaker
-
C4-09
CTC Discusses Vulnerability Management Strategies in Agile Development Achieved Through ASPM
-
Speaker
IssueHunt
CEO
Kazumasa Yokomizo
- Measures against information leakage
- Software chain Attack
- SBOM
Presented byIssueHunt K.K.
-
Speaker
-
Closed
WS4-04
Coming soon
- PSIRT / CSIRT
- Security auditing / system audit
- Human resource development
- Workshop
-
-
17:10 | 17:50
-
-
A4-10
Solution for prevention of leakage of technologies, for trade secret management, for reducing Human Vulnerability and for Human Risk Management
-
Speaker
Leo United Ginza Law Office
Attorney
Leona Ohki
- Measures against information leakage
- Vulnerability measures / Tampering measures
- Monitoring and detection
Presented byLeo United Ginza Law Office
-
Speaker
-
B4-10
Cyber Resilience for Endpoints: Rapid Recovery from Threats with Absolute Secure Endpoint
-
Speaker
Absolute Software K.K.
Senior System Engineer
Taira Fujita
-
Speaker
Internet Initiative Japan Inc.
DWP Solution Section
Business Promotion Department
Service Product Business DivisionKohei Matsuura
- Endpoint Security
- Zero trust security model
- Application Security
Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.
-
Speaker
-
C4-10
EDR challenges faced by organizations | A new security operations' approach in an era where all organizations are adopting EDR (TBD)
-
Speaker
WithSecure™ Japan
Product Marketing Manager
Cyber Security Products & ServicesYoshimasa Kanda
- Targeted Threat / Cyber Attack
- Ransomware measures
- XDR
Presented byWithSecure KK
-
Speaker
-
-
17:55 | 18:25
-
-
A4-11
What is ASM for visualizing attack surfaces?
- Interpretation and definition of ASM from a practitioner's perspective --
Speaker
Secure Sky Technology Inc.
Specialist
Yu Iwama
-
Speaker
BalaenaTech Co., Ltd.
Company President
Masashi Kouda
- Targeted Threat / Cyber Attack
- Vulnerability measures / Tampering measures
- Software chain Attack
-
Speaker
-
B4-11
Coming soon
-
Speaker
Bank of Japan
- Targeted Threat / Cyber Attack
- Critical Infrastructure Security
-
Speaker
-
C4-11
Amendement of Act on the Protection of Personal Information and its Impact on Corporate Practices
-
Speaker
Ushijima & Partners
Partner
Hiroyasu Kageshima
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-